{"id":33149,"date":"2017-08-24T21:46:33","date_gmt":"2017-08-25T01:46:33","guid":{"rendered":"http:\/\/www.opensource.im\/uncategorized\/qbitcoin-a-way-of-making-bitcoin-quantum-computer-proof-ieee-spectrum.php"},"modified":"2017-08-24T21:46:33","modified_gmt":"2017-08-25T01:46:33","slug":"qbitcoin-a-way-of-making-bitcoin-quantum-computer-proof-ieee-spectrum","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/cryptography\/qbitcoin-a-way-of-making-bitcoin-quantum-computer-proof-ieee-spectrum.php","title":{"rendered":"qBitcoin: A Way of Making Bitcoin Quantum-Computer Proof? &#8211; IEEE Spectrum"},"content":{"rendered":"<p><p>    A new quantum cryptography-based Bitcoin standard has been    proposed that could harden the popular cryptocurrency against    the advent of full-fledged quantum computers. Bitcoin as it now    exists involves traditional public key cryptography and thus    could conceivably be hacked by a future quantum computer strong    enough to break it. However, quantum cryptography, which is    based not on difficult math problems but the fundamental laws    of physics, is expected to be strong enough to withstand even    quantum computer-powered attacks.  <\/p>\n<p>    The proposal, dubbed qBitcoin, posits transmission of quantum    cryptographic keys between a remitter and a receiver of the    eponomous named cryptocurrency, qBitcoin. The system would use    provably secure protocols such as    theBB84quantum key distribution    scheme.  <\/p>\n<p>    To exchange qBitcoin, then, requires that there be a    transmission network in place that can send and receive bits of    quantum information, qubits. And that is no mean feat,    considering it typically involves preserving the polarization    states of individual photons across thousands of kilometers. To    date, there are five knownquantum key distributionnetworks in    the United States, Switzerland, Austria, and Japan. China is    working ontheir ownmassive 2000-km link, as    well. And a number of satellite-to-satellite and    satellite-to-ground quantum key distribution networks are    alsobeingdevelopedandprototyped.  <\/p>\n<p>    Which is to say that qBitcoin or something like it could not be    scaled up today. But if the quantum computer singularity is    approaching, in which a powerful enough machinecould    threaten existing cryptography standards, quantum cryptography    would be an essential ingredient of the post-Y2Q    age. So existing quantum key distribution networks might at    least serve as outposts in a burgeoning global quantum network,    like Western Union stations in the early days of the telegraph.  <\/p>\n<p>    Some things about qBitcoin might appear the same to any Bitcoin    user today. Bitcoin is a peer to peer system, and    qBitcoin is also peer to peer, says Kazuki Ikeda, qBitcoins    creator and PhD student in physics at Osaka University in    Japan.Hesays compared to Bitcoin, qBitcoin    would offer comparable or perhaps enhanced levels of privacy,    anonymity, and security. (That said, his paper that makes this    claim is still under peer review.)  <\/p>\n<p>    However, the lucrative profession ofBitcoin mining, under Ikedas protocol,    would be very different than what it is today. Transactions    would still need to be verified and secured. Butinstead    of todays system of acryptographic puzzles,    qBitcoins security would rely on a 2001proposalfor creating aquantum digital signature.Such a    signature would rely on the laws of quantum physics to secure    the qBitcoin ledger from tampering or hacking.  <\/p>\n<p>    Ikeda's proposal is certainly not the first to suggest a    quantum-cryptographic improvement    onclassical-cryptography-based digital currencies. Other    proposals in2010,2016,and evenearlier this    yearhave also offered up variations on the theme. All    work to mitigate against the danger large-scale quantum    computers would represent to Bitcoin.  <\/p>\n<p>    Of course, not every solution to the quantum singularity is as    promising as every other. A person going by the handle amluto    criticized Ikedas qBitcoin proposal onaprominent message boardlast week.    (amluto claimed to be author of one of aprevious quantum currency    proposalsfrom 2010presumably the 2010 proposals    co-author Andrew Lutomirski, althoughIEEE    Spectrumwas unable to confirm this supposition at    press time.)  <\/p>\n<p>      This is nonsense It's like saying that you can transmit a      file by mailing a USB stick, which absolutely guarantees that      you, the sender, no longer have the original file. That's      wrongall that mailing a USB stick guarantees is that you      don't have the USB stick any more, not that you didn't keep a      copy of the contents. Similarly, quantum teleportation eats      the input state but says nothing about any other copies of      the input state that may exist.    <\/p>\n<p>    Ikeda says he disagrees with the analogy. The point, he says,    is that there are no other copies of the input state as it's    called abovein other words of the quantum keys that secure    qBitcoin. So, Ikeda says, qBitcoin is safe just like Bitcoin is    safe today.  <\/p>\n<p>    But one day, thanks to quantum computers, Bitcoin, will no    longer be safe. Someone will needto save it. And, no    matter who devises the winning protocol, the thing that    threatens Bitcoinmay in fact also be the thing that comes    to its rescue: The cagey qubit.  <\/p>\n<p>      IEEE Spectrums general technology blog, featuring      news, analysis, and opinions about engineering, consumer      electronics, and technology and society, from the editorial      staff and freelance contributors.    <\/p>\n<p>      Sign up for the Tech Alert newsletter and receive      ground-breaking technology and science news from IEEE      Spectrum every Thursday.    <\/p>\n<\/p>\n<p>    The Beijing-Shanghai project will form the backbone of the    nations quantum communications network 26Oct2016  <\/p>\n<\/p>\n<p>    What is a blockchain and why is it the future of the web?    8Jul2015  <\/p>\n<\/p>\n<p>    New 53-kilometer record for quantum cryptography through the    air could enable a 24\/7 space-based quantum Internet    24Jul  <\/p>\n<\/p>\n<p>    While the fictional geniuses in HBOs Silicon Valley aim to    reinvent the Internet, Mozilla and the NSF hope prize money    will attract real-world innovations 23Aug  <\/p>\n<\/p>\n<p>    Organizations, organisms, and communication networks all have    similar growth dynamics 18Aug  <\/p>\n<\/p>\n<p>    Annual Las Vegas gathering of white-hat hackers breaks into    e-voting and registration systems, sometimes in just a few    hours 3Aug  <\/p>\n<\/p>\n<p>    It looks a lot different than its decentralized predecessors.    Can it last? 30Jun  <\/p>\n<\/p>\n<p>    This weeks Ukrainian malware attack cribbed from last months    WannaCry ransomware outbreakbut foreshadows worse to come    30Jun  <\/p>\n<\/p>\n<p>    Mouser and Grant Imahara team up with the creative minds at    WIRED Brand Lab to take a look at the modern city  <\/p>\n<\/p>\n<p>    Qudits can have 10 or more quantum states simultaneously    compared to just two for qubits 28Jun  <\/p>\n<\/p>\n<p>    Record distance for quantum entanglement set at more than 1,200    km 15Jun  <\/p>\n<\/p>\n<p>    The human neocortex learns and recognizes new songs with    amazing efficiency. See how it works 10Jun  <\/p>\n<\/p>\n<p>    Researchers publish taxonomy of trolls, sybils, and other    online troublemakers 9Jun  <\/p>\n<\/p>\n<p>    The Pied Piper of the TV show's fictional quest to reinvent the    Internet trails the progress of MaidSafe and the University of    Michigan 9Jun  <\/p>\n<\/p>\n<p>    Enel talks a blockchain energy market while advocating    incremental change in the sector 24May  <\/p>\n<\/p>\n<p>    The networking trick made famous by Bitcoin could make    car-to-cloud communication easier and more secure 24May  <\/p>\n<\/p>\n<p>    But would a digital cybertreaty of the future bind Redmond to    operate Windows XP as a public utility? 16May  <\/p>\n<\/p>\n<p>    Owlet provides new parents with much-needed sleep knowing that    their infants heart rate and oxygen levels are constantly and    effectively monitored.  <\/p>\n<\/p>\n<p>    The fictional entrepreneur of \"Silicon Valley\" sets out his    plan to reinvent the Internet, and decentralized Web pioneer    Brewster Kahle says it sounds very familiar 8May  <\/p>\n<\/p>\n<p>    Sovrin joins Hyperledger Indy to build a permissioned open    ledger for identity management 2May  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read the original post:<br \/>\n<a target=\"_blank\" href=\"http:\/\/spectrum.ieee.org\/tech-talk\/computing\/networks\/qbitcoin-making-bitcoin-quantumcomputer-proof\" title=\"qBitcoin: A Way of Making Bitcoin Quantum-Computer Proof? - IEEE Spectrum\">qBitcoin: A Way of Making Bitcoin Quantum-Computer Proof? - IEEE Spectrum<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> A new quantum cryptography-based Bitcoin standard has been proposed that could harden the popular cryptocurrency against the advent of full-fledged quantum computers. Bitcoin as it now exists involves traditional public key cryptography and thus could conceivably be hacked by a future quantum computer strong enough to break it. However, quantum cryptography, which is based not on difficult math problems but the fundamental laws of physics, is expected to be strong enough to withstand even quantum computer-powered attacks<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1600],"tags":[],"class_list":["post-33149","post","type-post","status-publish","format-standard","hentry","category-cryptography"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/33149"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=33149"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/33149\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=33149"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=33149"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=33149"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}